Human Factors/Behavioral Sciences Division
|
|
- Eunice Copeland
- 8 years ago
- Views:
Transcription
1 Human Factors/Behavioral Sciences Division DHS Technology Successes and Initiatives Biometrics Consortium Conference September 21, 2010 Sharla Rausch, Ph.D. Division Director Human Factors/Behavioral Sciences Division Science and Technology Directorate
2 Human Factors/Behavioral Sciences Division Vision: A safer, more resilient nation that incorporates the human dimension into homeland security analysis, operations and policy development Mission: We will advance national security by developing and applying the social, behavioral, and physical sciences to improve identification and analysis of threats, to enhance societal resilience, and to integrate human capabilities into the development of technology Customers: TSA, US-VISIT, USCIS, ICE, SCO, USSS, FEMA, OI&A, USCG, State & Local, S&T Divisions 2
3 HFD Thrust Areas & Programs Comprised of 3 primary thrust areas and 7 major programs Social-Behavioral Threat Analysis Motivation and Intent Suspicious Behavior Detection Community Preparedness & Resilience Personal Identification Systems Biometrics Credentialing Human Technology Integration Human Systems Research & Engineering Technology Acceptance & Integration Know our enemies, understand ourselves; put the human in the equation. 3
4 S&T: Suspicious Behavior Detection Identify Unknown Threats Goal: Improve screening by providing science-based capability to identify unknown threats indicated by deceptive and suspicious behavior Operational Needs Addressed: Real-time, non-invasive detection of deception or hostile-/mal-intent 4
5 S&T: Suspicious Behavior Detection Identify Unknown Threats Approach: Project Hostile Intent derives, validates, and automates non-invasive detection of indicators of suspicious behavior Predictive Screening derives, validates, and automates the detection of the observable indicators of suicide bombers Future Attribute Screening Technology (FAST) provides semi-automated screening using non-contact sensors to detect behavioral and physiological cues associated with malintent in near-real time Insider Threat develops technologies and methods for identifying insider threats 5
6 S&T: Personal Identification Systems Identify Known Threats Goal: Improve screening by providing science-based capability to identify known threats through accurate, timely, and easy-to-use biometric identification and credentialing validation tools Operational Needs Addressed: Real-time, robust, highly accurate verification of individual s identity High-speed, high-fidelity ergonomic fingerprint capture device 6
7 S&T: Personal Identification Systems Identify Known Threats... A Robust Biometric Toolbox Approach: Multi-Modal Biometrics develops technologies, standards, and tools to improve DHS screening processes and accurately identify known individuals Mobile Biometrics develops multi-modal mobile collection system to improve identification accuracy throughout the DHS and First Responder mission space Rapid DNA develops a rapid, low-cost system to prevent fraud in immigration and overseas adoptions Biometric Detector develops technologies for efficient, high-quality, contactless acquisition of fingerprints 7
8 S&T: Personal Identification Systems Identify Known Threats... In Multiple Operational Settings DHS has unique biometric challenges for screening operations 8
9 S&T: Personal Identification Systems Identify Known Threats... A Roadmap to Transition 9
10 S&T: Personal Identification Systems Identify Known Threats... Anywhere Mobile Biometrics Firefighters at hazardous materials situation Customs and Border Protection United States/Canadian Border State & Local Law Enforcement Traffic Stop Immigration and Customs Enforcement - California U.S. Coast Guard - Mona Pass at sea interdiction of Yola FEMA Earthquake Assistance Southern California Customs and Border Protection Pima County, Arizona 10
11 S&T: Personal Identification Systems Identify Known Threats... Non-Invasively, Accurately, and Safely Higher quality fingerprint collection even with dry, oily, and/or damaged fingerprints Less intrusive fingerprint collection process with reduced risk of communicable disease transfer 12
12 S&T: Personal Identification Systems Identify Known Threats... Through Kinship Analysis Rapid DNA-based Screening Technology: To verify family relationships for Asylum or immigration Overseas adoption Mass-casualty identification To reduce DNA screening for kinship from Weeks to under an hour $5,000 to $100 per sample External labs to in-house integrated hardware 13
13 S&T: Human Technology Integration Enhance Human Performance and Public Acceptance Goal: Enhance safety, effectiveness, and usability of technology by systematically incorporating user and pubic input Operational Needs Addressed: Address human performance in the design, development, test and evaluation of DHS systems and technologies Identify potential public acceptance issues 14
14 S&T: Human Technology Integration Enhance Human Performance and Public Acceptance Approach: Human Systems Research is designed to maximize and feed development of technologies for enhanced human performance Human Systems Engineering optimizes human performance and safety in the field and ensures basic human capabilities and limitations are considered throughout product development lifecycle Community Perceptions of Technology (CPT) Panels provides insight into development and adoption of application specific, publicly acceptable technologies and processes 15
15
Human Factors/Behavioral Sciences Division
Human Factors/Behavioral Sciences Division Research Transition Innovation Dr. Sharla Rausch, Head Human Factors/Behavioral Sciences Division Science and Technology Directorate U.S. Department of Homeland
More informationU.S. Coast Guard Biometric Enabled Identity Program. Provide consistent and repeatable maritime safety and security throughout our nation.
U.S. Coast Guard Biometric Enabled Identity Program Provide consistent and repeatable maritime safety and security throughout our nation. Unclassified 17 July 2012 Agenda Understanding the maritime domain
More informationEnterprise Biometric Identity Services at DHS: OBIM Update and Plans AFCEA Global Identity Summit 2014 Tampa, Florida September 15-18, 2014
Enterprise Biometric Identity Services at DHS: OBIM Update and Plans AFCEA Global Identity Summit 2014 Tampa, Florida September 15-18, 2014 Acting Deputy Director Kenneth Gantt Office of Biometric Identity
More informationDHS Rapid and Low-cost DNA Biometrics
Human Factors and Behavioral Sciences Division Research Transition Innovation DHS Rapid and Low-cost DNA Biometrics Christopher Miles Personal Identification Systems Research Director Human Factors/Behavioral
More informationDepartment of Homeland Security
Department of Homeland Security Biometrics Overview Neal Latta US-VISIT IDENT Program Manager 1 Importance of Biometric Standards in Post 9/11 Environment Dramatic Increase in Utilization of Biometric
More informationStatement for the Record. The Honorable Janet Napolitano. Secretary United States Department of Homeland Security
Statement for the Record The Honorable Janet Napolitano Secretary United States Department of Homeland Security Before the United States Senate Committee on Appropriations February 14, 2013 0 Chairwoman
More informationDEPARTMENT OF HOMELAND SECURITY
DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $43.2 billion, an increase of $309 million above the 2010 enacted level. Increases were made in core homeland security functions such as border
More informationDEPARTMENT OF HOMELAND SECURITY
DEPARTMENT OF HOMELAND SECURITY Since 2001, the Administration: Funded over 5,700 new Border Patrol agents, and acquired nearly 7,800 new detention beds; Provided nearly $37.5 billion to State, local,
More informationDEPARTMENT OF HOMELAND SECURITY
DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $39.5 billion, a decrease of 0.5 percent or $191 million, below the 2012 enacted level. The Budget continues strong investments in core homeland
More informationSTATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE
STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE ON OVERSIGHT AND MANAGEMENT EFFICIENCY U.S. HOUSE OF REPRESENTATIVES
More informationU.S. Department of Homeland Security Federal Program Inventory
U.S. Department of Homeland Security Federal Program Inventory Fiscal Year 2013 About this Report The U.S. Department of Homeland Security (DHS) Fiscal Year (FY) 2013 Federal Program Inventory describes
More informationDepartment of Homeland Security
Evaluation of DHS Information Security Program for Fiscal Year 2013 OIG-14-09 November 2013 Washington, DC 20528 / www.oig.dhs.gov November 21, 2013 MEMORANDUM FOR: FROM: SUBJECT: Jeffrey Eisensmith Chief
More informationDepartment of Homeland Security Office of Inspector General
Department of Homeland Security Office of Inspector General Vulnerabilities Highlight the Need for More Effective Web Security Management (Redacted) OIG-09-101 September 2009 Office of Inspector General
More informationDHS. CMSI Webinar Series
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
More informationOFFICE OF THE GENERAL COUNSEL HONORS ATTORNEY PROGRAM AND SUMMER LAW INTERN PROGRAM for 2011
OFFICE OF THE GENERAL COUNSEL HONORS ATTORNEY PROGRAM AND SUMMER LAW INTERN PROGRAM for 2011 Eligibility Requirements Open only to U.S. citizens Does not include lawful permanent residents Must obtain
More informationEl Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
More informationDeception Detection Techniques for Rapid Screening
Deception Detection Techniques for Rapid Screening Dr. Jay F. Nunamaker, Jr. Director, National Center for Border Security and Immigration Regents and Soldwedel Professor of MIS, Computer Science, and
More informationOFFICE OF INSPECTOR GENERAL DEPARTMENT OF HOMELAND SECURITY
s ANNUAL PERFORMANCE PLAN FOR FISCAL YEAR 2013 OFFICE OF INSPECTOR GENERAL DEPARTMENT OF HOMELAND SECURITY The Government Performance and Results Act of 1993, Public Law 103-62, requires agencies to submit
More informationThe Leading Provider of Identity Solutions and Services in the U.S.
THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that
More informationCyberSkills Management Support Initiative
CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced
More informationHow To Buy A House At Homeland Security
U.S. Department of Homeland Security Conducting Business with the Department of Homeland Security Robert J. Boone Jr Director, Small Business Transportation Security Administration U.S. Department of Homeland
More informationOffice of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Review of DHS Security Controls for Portable Storage Devices OIG-08-95 September 2008 Office of Inspector General U.S. Department of Homeland
More informationEXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 July 19, 2002 M-02-12 MEMORANDUM FOR THE HEADS OF SELECTED DEPARTMENTS AND AGENCIES FROM: SUBJECT: Mitchell E. Daniels,
More informationEvaluation of DHS' Information Security Program for Fiscal Year 2015
Evaluation of DHS' Information Security Program for Fiscal Year 2015 January 5, 2016 OIG-16-08 (Revised) DHS OIG HIGHLIGHTS Evaluation of DHS Information Security Program for Fiscal Year 2015 January 5,
More informationIntegrated Security Management System (ISMS)
for the (ISMS) September 16, 2014 Contact Point David Colangelo Security Systems Division, Office of the Chief Security Officer Management Directorate (202) 447-5320 Reviewing Official Karen L. Neuman
More informationOptical Memory Cards in Federal Government
NIST Storage & Processor Card Workshop July 7 & 8, 2003, Gaithersburg, MD Optical Memory Cards in Federal Government Stephen Price-Francis Vice President, Business Development LaserCard Systems Corporation
More informationIDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of
More informationOperational and Policy Considerations. Glenn R. Cook Department of Information Sciences Naval Postgraduate School Monterey, CA
Identity Management: Operational and Policy Considerations Glenn R. Cook Department of Information Sciences Naval Postgraduate School Monterey, CA IdM Operations and Policy Who Are You? Identifying Friend
More informationOffice of Biometric Identity Management Expenditure Plan
Office of Biometric Identity Management Expenditure Plan June 11, 2015 Fiscal Year 2015 Report to Congress Office of the Chief Financial Officer Executive Summary The Office of Biometric Identity Management
More informationHigh-Priority Technology Needs. May 2009. Version 3.0
High-Priority Technology Needs May 2009 Version 3.0 U.S. Department of Homeland Security Washington, D.C. 20528 May 2009 Delivery of homeland security technological capabilities is what the DHS S&T Directorate
More informationSecurityManager. Enterprise Personnel & Physical Security Case Management Solution for Federal Agencies
SecurityManager Enterprise Personnel & Physical Security Case Management Solution for Federal Agencies SecurityManager is THE CENTECH GROUP, Inc s (CENTECH s) Web-based enterprise case management solution
More informationSoftware Systems Consultants Inc. IT Solutions & Staffing Services
Software Systems Consultants Inc. IT Solutions & Staffing Services 137 Carter Court SW Suite 107 Vienna VA, 22180 703.597.4847 Fax 1.877.256.9979 WWW.SSCI-IT.COM wsyriani@ssci-it.com Since it s inception,
More informationMissouri Department of Natural Resources Public Drinking Water Branch 1-800-361-4827 or (573) 751-5331
Missouri Department of Natural Resources Public Drinking Water Branch 1-800-361-4827 or (573) 751-5331 U.S. Environmental Protection Agency s Water Security Handbook: Planning for and Responding to Drinking
More informationFuture Years Homeland Security Program (FYHSP)
Future Years Homeland Security Program (FYHSP) Fiscal Years 2016 2020 April 7, 2015 Fiscal Year 2015 Report to Congress Office of the Chief Financial Officer Executive Summary The FY 2016 FY 2020 FYHSP
More informationNEBRASKA STATE HOMELAND SECURITY STRATEGY
NEBRASKA STATE HOMELAND SECURITY STRATEGY 2014-2016 Nebraska Homeland Security Policy Group/Senior Advisory Council This document provides an overall framework for what the State of Nebraska hopes to achieve
More informationUnited States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)
for the Conversion to 10-Fingerprint Collection for the United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) November 15, 2007 Contact Point Barbara M. Harrison, Acting Privacy
More informationSECURITY BIOMETRICS PDF
SECURITY BIOMETRICS PDF ==> Download: SECURITY BIOMETRICS PDF SECURITY BIOMETRICS PDF - Are you searching for Security Biometrics Books? Now, you will be happy that at this time Security Biometrics PDF
More informationDepartment of Homeland Security
Department of Homeland Security DHS Information Technology Management Has Improved, But Challenges Remain OIG-12-82 May 2012 Office of Inspector General U.S. Department of Homeland Security Washington,
More informationIntegrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,
More informationDepartment of Homeland Security Office of Inspector General. DHS' Progress in Disaster Recovery Planning for Information Systems
Department of Homeland Security Office of Inspector General DHS' Progress in Disaster Recovery Planning for Information Systems OIG-09-60 April 2009 Office of Inspector General U.S. Department of Homeland
More informationRising to the Challenge
CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned
More informationMay 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.
More informationIntroduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
More informationFor Official Use Only (FOUO)
The FEMA Mission To support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, and
More informationSTATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE
STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT ORGANIZATION,
More informationU.S. Department of Homeland Security STATEMENT
U.S. Department of Homeland Security STATEMENT OF PAUL M. KILCOYNE DEPUTY ASSISTANT DIRECTOR OF INVESTIGATIVE SERVICES DIVISION U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT U.S. DEPARTMENT OF HOMELAND SECURITY
More informationApplying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
More informationAgency Information Collection Activities: Proposed Collection; Comment Request; AGENCY: Federal Emergency Management Agency, DHS.
This document is scheduled to be published in the Federal Register on 02/10/2016 and available online at http://federalregister.gov/a/2016-02640, and on FDsys.gov Billing Code: 9110-21-P DEPARTMENT OF
More informationDepartment of Homeland Security Strategic Plan
Department of Homeland Security Strategic Plan Fiscal Years 2012-2016 February 2012 Message from the Secretary February 13, 2012 I am pleased to submit the U.S. Department of Homeland Security (DHS) Strategic
More informationAutomated Biometric Identification System (IDENT)
for the Automated Biometric Identification System (IDENT) DHS/NPPD/USVISIT/PIA-002 December 7, 2012 Contact Point Kenneth Gantt Assistant Director Program Integration and Mission Services Division DHS/NPPD/US-VISIT
More informationThreat and Hazard Identification and Risk Assessment
Threat and Hazard Identification and Risk Assessment Background/Overview and Process Briefing Homeland Security Preparedness Technical Assistance Program May 2012 PPD-8 Background A linking together of
More informationAppendix -- Homeland Security Mission Funding by Agency and Budget Account (budget authority in millions of dollars)
Department of Agriculture 508.8-528.6-603.6 Agricultural Research Service/ Buildings and Facilities/005-18-1401 - - 45.0-113.7 Protecting Critical Infrastructure and Key Assets - - 45.0-113.7 Agricultural
More informationGood Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries
More informationMerchant Mariner Licensing and Documentation System
for the Merchant Mariner Licensing and Documentation System DHS/USCG/PIA-020 March 1, 2011 Contact Point Gary Chappell MMLD Project Officer U.S. Coast Guard CG-633 (202) 372-1293 Reviewing Official Mary
More informationOverview of Homeland Security Funding 1999 to Present National Incident Management System Mandates and Training Requirements
Overview of Homeland Security Funding 1999 to Present National Incident Management System Mandates and Training Requirements Jim Weldin Delaware League of Local Governments 1 Homeland Security Grant Funding
More informationExamples of Large Scale Biometrics Systems:
Examples of Large Scale Biometrics Systems: International Solutions for Exit/Entry, Border Control, National ID and Secure Passport Systems Biometrics Consortium Conference Pat Sankar, Behnam Bavarian
More informationProvide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
More informationUnited States Coast Guard Cyber Command. Achieving Cyber Security Together. Homeland Security
United States Coast Guard Cyber Command Achieving Cyber Together Brett Rouzer Chief of MCIKR Protection U.S. Coast Guard Cyber Command DHS NCCIC Liaison Officer (202) 372-3113 Brett.R.Rouzer@uscg.mil Vision
More informationAudit of Security Controls for DHS Information Technology Systems at San Francisco International Airport
Audit of Security Controls for DHS Information Technology Systems at San Francisco International Airport May 7, 2015 DHS OIG HIGHLIGHTS Audit of Security Controls for DHS Information Technology Systems
More informationGeneral Services Administration (GSA) DHS Headquarters Consolidation at St Elizabeths Campus. PROJECT OVERVIEW By: Shapour Ebadi
General Services Administration (GSA) DHS Headquarters Consolidation at St Elizabeths Campus PROJECT OVERVIEW By: Shapour Ebadi Existing Aerial 176-acre National Historic Landmark 70 existing buildings
More informationIntegrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
More informationDepartment of Homeland Security
Department of Homeland Security Information Sharing on Foreign Nationals: Border Security (Redacted) OIG-12-39 February 2012 U.S. Department of Homeland Security Washington, DC 20528 February 13, 2012
More informationEvaluation of DHS' Information Security Program for Fiscal Year 2014
Evaluation of DHS' Information Security Program for Fiscal Year 2014 December 12, 2014 HIGHLIGHTS Evaluation of DHS Information Security Program for Fiscal Year 2014 December 12, 2014 Why We Did This We
More informationPerformance and Accountability Report
Performance and Accountability Report Fiscal Year 2003 Message from the Secretary February 13, 2004 I am pleased to provide the Department of Homeland Security s Performance and Accountability Report for
More informationFact Sheet August 22, 2011
Fact Sheet August 22, 2011 USCIS and ICE Procedures Implementing EOIR Regulations on Background and Security Checks on Individuals Seeking Relief or Protection from Removal In Immigration Court or Before
More informationDEPARTMENT OF HOMELAND SECURITY APPROPRIATIONS FOR FISCAL YEAR 2011
DEPARTMENT OF HOMELAND SECURITY APPROPRIATIONS FOR FISCAL YEAR 2011 WEDNESDAY, FEBRUARY 24, 2010 U.S. SENATE, APPROPRIATIONS, Washington, DC. The subcommittee met at 2 p.m., in room SD 192, Dirksen Senate
More informationDepartment of Homeland Security
11 Department of Homeland Security Jodi Lieberman American Physical Society Highlights The FY 2014 Department of Homeland Security (DHS) Science and Technology Directorate (S&T) request totals $1.5 billion,
More informationSTATEMENT OF J. RICHARD BERMAN ASSISTANT INSPECTOR GENERAL FOR AUDITS OFFICE OF INSPECTOR GENERAL U. S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE
STATEMENT OF J. RICHARD BERMAN ASSISTANT INSPECTOR GENERAL FOR AUDITS OFFICE OF INSPECTOR GENERAL U. S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE SELECT COMMITTEE ON HOMELAND SECURITY U. S. HOUSE OF REPRESENTATIVES
More informationNICE Cybersecurity Workforce Framework Tutorial
NICE Cybersecurity Workforce Framework Tutorial Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy, DHS Outline
More informationAccurate Reporting and Oversight Needed to Help Manage DHS' Warehouse Portfolio
Accurate Reporting and Oversight Needed to Help Manage DHS' Warehouse Portfolio OIG-15-138 August 28, 2015 DHS OIG HIGHLIGHTS Accurate Reporting and Oversight Needed to Help Manage DHS Warehouse Portfolio
More informationGAO HOMELAND SECURITY. Strategic Solution for US-VISIT Program Needs to Be Better Defined, Justified, and Coordinated
GAO United States Government Accountability Office Report to the Chairman and Ranking Member, Committee on Homeland Security, House of Representatives February 2008 HOMELAND SECURITY Strategic Solution
More informationA Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
More informationEnforcement Integrated Database (EID)
for the Enforcement Integrated Database (EID) January 14, 2010 Contact Point James Dinkins Director, Office of Investigations U.S. Immigration and Customs Enforcement 202-732-5100 Reviewing Official Mary
More informationAlien Criminal Response Information Management System (ACRIMe) April 22, 2010
for Alien Criminal Response Information Management System (ACRIMe) April 22, 2010 Contact Point James A. Dinkins, Director Office of Investigations U.S. Immigration & Customs Enforcement (202) 732-5100
More informationHOMELAND SECURITY ACQUISITIONS
United States Government Accountability Office Report to Congressional Requesters April 2015 HOMELAND SECURITY ACQUISITIONS Major Program Assessments Reveal Actions Needed to Improve Accountability GAO-15-171SP
More informationTSA and the SpOT Program
BEHAVIORAL SCIENCE AND SECURITY: EVALUATING TSA S SPOT PROGRAM HEARING BEFORE THE SUBCOMMITTEE ON INVESTIGATIONS AND OVERSIGHT COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HOUSE OF REPRESENTATIVES ONE HUNDRED
More informationGAO HOMELAND SECURITY. Contract Management and Oversight for Visitor and Immigrant Status Program Need to Be Strengthened
GAO United States Government Accountability Office Report to Congressional Requesters June 2006 HOMELAND SECURITY Contract Management and Oversight for Visitor and Immigrant Status Program Need to Be Strengthened
More informationBiometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
More informationMORPHO CRIMINAL JUSTICE SUITE
MORPHO CRIMINAL JUSTICE SUITE FULL RANGE OF PRODUCTS DEDICATED TO CRIMINAL JUSTICE MISSIONS 2 1 3 Morpho provides law enforcement with a wide range of products to support criminal investigation, background
More informationHomeland Security Major
Homeland Security Major Zach Wexman, Onye Chi-ukpai, Daniel Rapcsak, John Jackson Prior to the attacks of 9/11, a degree in Homeland Security was non-existent. The U.S. isn t only vulnerable to political
More informationAPPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES
APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES Northern Border Activities B-1 July 2012 CBP MISSION We are the guardians of our Nation s borders. We are America s frontline.
More informationNational Training and Simulation Association. Department of Homeland Security. Training 2015
National Training and Simulation Association Department of Homeland Security Training 2015 Released in November 2010 may not be reproduced in any media without the written permission of NTSA. For further
More information2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
More informationDHS' Oversight of Its Workforce Training Needs Improvement
DHS' Oversight of Its Workforce Training Needs Improvement January 20, 2016 OIG-16-19 DHS OIG HIGHLIGHTS DHS' Oversight of Its Workforce Training Needs Improvement January 20, 2016 Why We Did This Audit
More informationOur security philosophy. Our team of experts
Security at Work Our security philosophy A critical part of our mission to make the world more open and connected is providing a secure community for everyone who uses Facebook. Ensuring the security of
More informationCBO. Federal Funding for Homeland Security: An Update. What Is Homeland Security?
CBO A series of issue summaries from the Congressional Budget Office JULY 20, 2005 Federal Funding for Homeland Security: An Update The terrorist attacks of September 11, 2001, heightened Congressional
More informationSECURITY SOLUTIONS BANKING AND FINANCE
SECURITY SOLUTIONS BANKING AND FINANCE Pacom has developed a distinguished reputation as a global leader in the field of remote security management for the banking and financial market. Over 25 years of
More informationFEDERAL CLOUD COMPUTING SUMMIT
FEDERAL CLOUD COMPUTING SUMMIT Federal Cloud Computing Summit January 14-15, 2015 Washington Marriott at Metro Center The Federal Cloud Computing Summit will be held on January 14-15, 2015, at the Washington
More informationNational Incident Management System (NIMS) Communications and Information Management Standards
National Incident Management System (NIMS) Communications and Information Management Standards Purpose of the Guide: This NIMS Guide provides a brief overview of five recommended standards that support
More informationDepartment of Homeland Security Office of Inspector General. Stronger Security Controls Needed on Active Directory Systems
Department of Homeland Security Office of Inspector General Stronger Security Controls Needed on Active Directory Systems OIG-10-86 May 2010 Office (!{Inspector General U.S. Department of Homeland Security
More informationHow To Write A Book On Risk Management
National Center for Risk and Economic Analysis of Terrorism Events CREATE FY2015 (Year 11) Call for White Papers CREATE, the DHS-sponsored Center of Excellence at the University of Southern California,
More informationReliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
More informationProduct. Opencheck A Comprehensive Check Payments Solution to Meet the Demands of Financial Institutions in Today s Automated Environment
Product Opencheck A Comprehensive Check Payments Solution to Meet the Demands of Financial Institutions in Today s Automated Environment Product As acceptance of electronic payment channels expands, your
More informationDepartment of Homeland Security DHS Directives System Directive Number: 066-01 Revision Number: 00 Issue Date: 07/25/2008 SAFETY AND HEALTH PROGRAMS
Department of Homeland Security DHS Directives System Directive Number: 066-01 Revision Number: 00 Issue Date: 07/25/2008 SAFETY AND HEALTH PROGRAMS I. Purpose This Directive establishes the Department
More informationW H I T E P A P E R. Hub and Spoke Approach to Computer-Aided Dispatch
W H I T E P A P E R Hub and Spoke Approach to Computer-Aided Dispatch 1 Introduction Intergraph s hub and spoke approach to computer-aided dispatch (CAD) provides an alternative to a standalone independent
More informationOffice of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Review of the Status of Department of Homeland Efforts to Address Its Major Management Challenges OIG-04-21 Office of Audits March 2004 Preface
More informationWhy Nobody Cares: How Investment in Data Visualization and Open Access Can Reinvigorate Dying Programs
Why Nobody Cares: How Investment in Data Visualization and Open Access Can Reinvigorate Dying Programs Michael L. Pack, University of Maryland CATT Laboratory Problems that I hear You can t afford to collect
More informationEffective Information Sharing and Analysis Process
Bringing Data to Life Presented by Michael Echols REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM DHS Responsibilities Emergency Communications Capabilities Secure dot-gov Assist in Protecting
More informationMEMORANDUM FOR FINANCE COMMITTEE MEMBERS. From: Senate Finance Committee Staff. Date: May 12, 2010. Alan Bersin Nomination
MEMORANDUM FOR FINANCE COMMITTEE MEMBERS From: Senate Finance Committee Staff Date: May 12, 2010 Re: Alan Bersin Nomination This memo describes the results of the Senate Finance Committee staff review
More informationUS Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)
US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) william.newhouse@nist.gov NITRD Structure for US Federal Cybersecurity
More information